blob: 4194cda2d04c39e0d06ecbf85ae4ebd9623ede3c [file] [log] [blame]
Oded Gabbayc4d66342019-02-16 00:39:11 +02001// SPDX-License-Identifier: GPL-2.0
2
3/*
4 * Copyright 2016-2019 HabanaLabs, Ltd.
5 * All Rights Reserved.
6 *
7 */
8
Tomer Tayare00dac32019-04-10 15:18:46 +03009#define pr_fmt(fmt) "habanalabs: " fmt
10
Oded Gabbayc4d66342019-02-16 00:39:11 +020011#include "habanalabs.h"
12
13#include <linux/pci.h>
Ofir Bitton2e5eda42020-05-20 16:35:08 +030014#include <linux/aer.h>
Oded Gabbayc4d66342019-02-16 00:39:11 +020015#include <linux/module.h>
16
17#define HL_DRIVER_AUTHOR "HabanaLabs Kernel Driver Team"
18
19#define HL_DRIVER_DESC "Driver for HabanaLabs's AI Accelerators"
20
21MODULE_AUTHOR(HL_DRIVER_AUTHOR);
22MODULE_DESCRIPTION(HL_DRIVER_DESC);
23MODULE_LICENSE("GPL v2");
24
25static int hl_major;
26static struct class *hl_class;
Oded Gabbay5e6e0232019-02-27 12:15:16 +020027static DEFINE_IDR(hl_devs_idr);
28static DEFINE_MUTEX(hl_devs_idr_lock);
Oded Gabbayc4d66342019-02-16 00:39:11 +020029
Oded Gabbay17b59dd2021-02-17 13:34:44 +020030static int timeout_locked = 30;
Oded Gabbayeff6f4a2019-02-16 00:39:21 +020031static int reset_on_lockup = 1;
Oded Gabbay7fb2a1f2021-05-12 20:46:12 +030032static int memory_scrub;
Oded Gabbay27a9e352021-04-12 09:52:05 +030033static ulong boot_error_status_mask = ULONG_MAX;
Oded Gabbayeff6f4a2019-02-16 00:39:21 +020034
35module_param(timeout_locked, int, 0444);
36MODULE_PARM_DESC(timeout_locked,
Oded Gabbay17b59dd2021-02-17 13:34:44 +020037 "Device lockup timeout in seconds (0 = disabled, default 30s)");
Oded Gabbayeff6f4a2019-02-16 00:39:21 +020038
39module_param(reset_on_lockup, int, 0444);
40MODULE_PARM_DESC(reset_on_lockup,
41 "Do device reset on lockup (0 = no, 1 = yes, default yes)");
42
farah kassabri03df1362020-05-06 11:17:38 +030043module_param(memory_scrub, int, 0444);
44MODULE_PARM_DESC(memory_scrub,
Oded Gabbay7fb2a1f2021-05-12 20:46:12 +030045 "Scrub device memory in various states (0 = no, 1 = yes, default no)");
farah kassabri03df1362020-05-06 11:17:38 +030046
Oded Gabbay27a9e352021-04-12 09:52:05 +030047module_param(boot_error_status_mask, ulong, 0444);
48MODULE_PARM_DESC(boot_error_status_mask,
49 "Mask of the error status during device CPU boot (If bitX is cleared then error X is masked. Default all 1's)");
50
Oded Gabbayc4d66342019-02-16 00:39:11 +020051#define PCI_VENDOR_ID_HABANALABS 0x1da3
52
53#define PCI_IDS_GOYA 0x0001
Oded Gabbay6966d9e2020-03-21 10:58:32 +020054#define PCI_IDS_GAUDI 0x1000
Ofir Bittone5042a62021-04-01 13:43:40 +030055#define PCI_IDS_GAUDI_SEC 0x1010
Oded Gabbayc4d66342019-02-16 00:39:11 +020056
57static const struct pci_device_id ids[] = {
58 { PCI_DEVICE(PCI_VENDOR_ID_HABANALABS, PCI_IDS_GOYA), },
Oded Gabbay6966d9e2020-03-21 10:58:32 +020059 { PCI_DEVICE(PCI_VENDOR_ID_HABANALABS, PCI_IDS_GAUDI), },
Ofir Bittone5042a62021-04-01 13:43:40 +030060 { PCI_DEVICE(PCI_VENDOR_ID_HABANALABS, PCI_IDS_GAUDI_SEC), },
Oded Gabbayc4d66342019-02-16 00:39:11 +020061 { 0, }
62};
Oded Gabbay824b4572020-05-03 15:30:55 +030063MODULE_DEVICE_TABLE(pci, ids);
Oded Gabbayc4d66342019-02-16 00:39:11 +020064
65/*
66 * get_asic_type - translate device id to asic type
67 *
68 * @device: id of the PCI device
69 *
70 * Translate device id to asic type.
71 * In case of unidentified device, return -1
72 */
73static enum hl_asic_type get_asic_type(u16 device)
74{
75 enum hl_asic_type asic_type;
76
77 switch (device) {
78 case PCI_IDS_GOYA:
79 asic_type = ASIC_GOYA;
80 break;
Oded Gabbay6966d9e2020-03-21 10:58:32 +020081 case PCI_IDS_GAUDI:
82 asic_type = ASIC_GAUDI;
83 break;
Ofir Bittone5042a62021-04-01 13:43:40 +030084 case PCI_IDS_GAUDI_SEC:
85 asic_type = ASIC_GAUDI_SEC;
86 break;
Oded Gabbayc4d66342019-02-16 00:39:11 +020087 default:
88 asic_type = ASIC_INVALID;
89 break;
90 }
91
92 return asic_type;
93}
94
Ofir Bittone5042a62021-04-01 13:43:40 +030095static bool is_asic_secured(enum hl_asic_type asic_type)
96{
97 switch (asic_type) {
98 case ASIC_GAUDI_SEC:
99 return true;
100 default:
101 return false;
102 }
103}
104
Oded Gabbayc4d66342019-02-16 00:39:11 +0200105/*
106 * hl_device_open - open function for habanalabs device
107 *
108 * @inode: pointer to inode structure
109 * @filp: pointer to file structure
110 *
111 * Called when process opens an habanalabs device.
112 */
113int hl_device_open(struct inode *inode, struct file *filp)
114{
Ofir Bitton66a76402020-10-05 14:40:10 +0300115 enum hl_device_status status;
Oded Gabbayc4d66342019-02-16 00:39:11 +0200116 struct hl_device *hdev;
117 struct hl_fpriv *hpriv;
Oded Gabbay0861e412019-02-16 00:39:14 +0200118 int rc;
Oded Gabbayc4d66342019-02-16 00:39:11 +0200119
120 mutex_lock(&hl_devs_idr_lock);
121 hdev = idr_find(&hl_devs_idr, iminor(inode));
122 mutex_unlock(&hl_devs_idr_lock);
123
124 if (!hdev) {
125 pr_err("Couldn't find device %d:%d\n",
126 imajor(inode), iminor(inode));
127 return -ENXIO;
128 }
129
130 hpriv = kzalloc(sizeof(*hpriv), GFP_KERNEL);
Oded Gabbayeb7caf82019-07-30 11:56:09 +0300131 if (!hpriv)
132 return -ENOMEM;
Oded Gabbayc4d66342019-02-16 00:39:11 +0200133
134 hpriv->hdev = hdev;
135 filp->private_data = hpriv;
136 hpriv->filp = filp;
Oded Gabbayeff6f4a2019-02-16 00:39:21 +0200137 mutex_init(&hpriv->restore_phase_mutex);
Oded Gabbayc4d66342019-02-16 00:39:11 +0200138 kref_init(&hpriv->refcount);
139 nonseekable_open(inode, filp);
140
Oded Gabbaybe5d9262019-02-16 00:39:15 +0200141 hl_cb_mgr_init(&hpriv->cb_mgr);
Oded Gabbay0861e412019-02-16 00:39:14 +0200142 hl_ctx_mgr_init(&hpriv->ctx_mgr);
143
Oded Gabbayeb7caf82019-07-30 11:56:09 +0300144 hpriv->taskpid = find_get_pid(current->pid);
145
146 mutex_lock(&hdev->fpriv_list_lock);
147
Ofir Bitton66a76402020-10-05 14:40:10 +0300148 if (!hl_device_operational(hdev, &status)) {
Oded Gabbayeb7caf82019-07-30 11:56:09 +0300149 dev_err_ratelimited(hdev->dev,
Ofir Bitton66a76402020-10-05 14:40:10 +0300150 "Can't open %s because it is %s\n",
151 dev_name(hdev->dev), hdev->status[status]);
Oded Gabbayeb7caf82019-07-30 11:56:09 +0300152 rc = -EPERM;
Oded Gabbay0861e412019-02-16 00:39:14 +0200153 goto out_err;
154 }
155
Oded Gabbayeb7caf82019-07-30 11:56:09 +0300156 if (hdev->in_debug) {
157 dev_err_ratelimited(hdev->dev,
158 "Can't open %s because it is being debugged by another user\n",
159 dev_name(hdev->dev));
160 rc = -EPERM;
161 goto out_err;
162 }
Oded Gabbayc4d66342019-02-16 00:39:11 +0200163
Oded Gabbayeb7caf82019-07-30 11:56:09 +0300164 if (hdev->compute_ctx) {
Oded Gabbay4d6a7752019-07-30 09:10:50 +0300165 dev_dbg_ratelimited(hdev->dev,
Oded Gabbayeb7caf82019-07-30 11:56:09 +0300166 "Can't open %s because another user is working on it\n",
167 dev_name(hdev->dev));
168 rc = -EBUSY;
169 goto out_err;
170 }
171
172 rc = hl_ctx_create(hdev, hpriv);
173 if (rc) {
174 dev_err(hdev->dev, "Failed to create context %d\n", rc);
175 goto out_err;
176 }
177
178 /* Device is IDLE at this point so it is legal to change PLLs.
179 * There is no need to check anything because if the PLL is
180 * already HIGH, the set function will return without doing
181 * anything
Oded Gabbayd91389b2019-02-16 00:39:19 +0200182 */
183 hl_device_set_frequency(hdev, PLL_HIGH);
184
Oded Gabbayeb7caf82019-07-30 11:56:09 +0300185 list_add(&hpriv->dev_node, &hdev->fpriv_list);
186 mutex_unlock(&hdev->fpriv_list_lock);
187
Oded Gabbayc2164772019-02-16 00:39:24 +0200188 hl_debugfs_add_file(hpriv);
189
Yuri Nudelmane307b302021-05-24 11:25:21 +0300190 hdev->open_counter++;
191 hdev->last_successful_open_jif = jiffies;
192
Oded Gabbayc4d66342019-02-16 00:39:11 +0200193 return 0;
Oded Gabbay0861e412019-02-16 00:39:14 +0200194
195out_err:
Oded Gabbayeb7caf82019-07-30 11:56:09 +0300196 mutex_unlock(&hdev->fpriv_list_lock);
Oded Gabbay0861e412019-02-16 00:39:14 +0200197
Oded Gabbayeb7caf82019-07-30 11:56:09 +0300198 hl_cb_mgr_fini(hpriv->hdev, &hpriv->cb_mgr);
199 hl_ctx_mgr_fini(hpriv->hdev, &hpriv->ctx_mgr);
200 filp->private_data = NULL;
201 mutex_destroy(&hpriv->restore_phase_mutex);
202 put_pid(hpriv->taskpid);
203
204 kfree(hpriv);
Oded Gabbayac0ae6a2020-05-11 10:29:27 +0300205
Oded Gabbay0861e412019-02-16 00:39:14 +0200206 return rc;
Oded Gabbayc4d66342019-02-16 00:39:11 +0200207}
208
Oded Gabbay4d6a7752019-07-30 09:10:50 +0300209int hl_device_open_ctrl(struct inode *inode, struct file *filp)
210{
211 struct hl_device *hdev;
212 struct hl_fpriv *hpriv;
213 int rc;
214
215 mutex_lock(&hl_devs_idr_lock);
216 hdev = idr_find(&hl_devs_idr, iminor(inode));
217 mutex_unlock(&hl_devs_idr_lock);
218
219 if (!hdev) {
220 pr_err("Couldn't find device %d:%d\n",
221 imajor(inode), iminor(inode));
222 return -ENXIO;
223 }
224
225 hpriv = kzalloc(sizeof(*hpriv), GFP_KERNEL);
226 if (!hpriv)
227 return -ENOMEM;
228
229 mutex_lock(&hdev->fpriv_list_lock);
230
Ofir Bitton66a76402020-10-05 14:40:10 +0300231 if (!hl_device_operational(hdev, NULL)) {
Oded Gabbay4d6a7752019-07-30 09:10:50 +0300232 dev_err_ratelimited(hdev->dev_ctrl,
233 "Can't open %s because it is disabled or in reset\n",
234 dev_name(hdev->dev_ctrl));
235 rc = -EPERM;
236 goto out_err;
237 }
238
239 list_add(&hpriv->dev_node, &hdev->fpriv_list);
240 mutex_unlock(&hdev->fpriv_list_lock);
241
242 hpriv->hdev = hdev;
243 filp->private_data = hpriv;
244 hpriv->filp = filp;
245 hpriv->is_control = true;
246 nonseekable_open(inode, filp);
247
248 hpriv->taskpid = find_get_pid(current->pid);
249
250 return 0;
251
252out_err:
253 mutex_unlock(&hdev->fpriv_list_lock);
254 kfree(hpriv);
255 return rc;
256}
257
Oded Gabbay8c173dc2019-05-08 09:55:23 +0300258static void set_driver_behavior_per_device(struct hl_device *hdev)
259{
Ofir Bitton6a2f5d72021-02-15 13:23:04 +0200260 hdev->fw_components = FW_TYPE_ALL_TYPES;
Oded Gabbay8c173dc2019-05-08 09:55:23 +0300261 hdev->cpu_queues_enable = 1;
262 hdev->heartbeat = 1;
Ofir Bittond1ddd902020-10-19 17:04:20 +0300263 hdev->mmu_enable = 1;
Oded Gabbaye38bfd32020-07-03 20:46:12 +0300264 hdev->clock_gating_mask = ULONG_MAX;
Oded Gabbayac0ae6a2020-05-11 10:29:27 +0300265 hdev->sram_scrambler_enable = 1;
266 hdev->dram_scrambler_enable = 1;
Oded Gabbayac0ae6a2020-05-11 10:29:27 +0300267 hdev->bmc_enable = 1;
268 hdev->hard_reset_on_fw_events = 1;
Ofir Bittond1ddd902020-10-19 17:04:20 +0300269 hdev->reset_on_preboot_fail = 1;
Ofir Bitton84586de2021-05-20 13:30:31 +0300270 hdev->reset_if_device_not_idle = 1;
Ofir Bittond1ddd902020-10-19 17:04:20 +0300271
272 hdev->reset_pcilink = 0;
273 hdev->axi_drain = 0;
Oded Gabbay8c173dc2019-05-08 09:55:23 +0300274}
275
Oded Gabbayc4d66342019-02-16 00:39:11 +0200276/*
277 * create_hdev - create habanalabs device instance
278 *
279 * @dev: will hold the pointer to the new habanalabs device structure
280 * @pdev: pointer to the pci device
281 * @asic_type: in case of simulator device, which device is it
282 * @minor: in case of simulator device, the minor of the device
283 *
284 * Allocate memory for habanalabs device and initialize basic fields
285 * Identify the ASIC type
286 * Allocate ID (minor) for the device (only for real devices)
287 */
288int create_hdev(struct hl_device **dev, struct pci_dev *pdev,
289 enum hl_asic_type asic_type, int minor)
290{
291 struct hl_device *hdev;
Oded Gabbay4d6a7752019-07-30 09:10:50 +0300292 int rc, main_id, ctrl_id = 0;
Oded Gabbayc4d66342019-02-16 00:39:11 +0200293
294 *dev = NULL;
295
296 hdev = kzalloc(sizeof(*hdev), GFP_KERNEL);
297 if (!hdev)
298 return -ENOMEM;
299
Oded Gabbay8c173dc2019-05-08 09:55:23 +0300300 /* First, we must find out which ASIC are we handling. This is needed
301 * to configure the behavior of the driver (kernel parameters)
302 */
Oded Gabbay29593842019-04-04 14:33:34 +0300303 if (pdev) {
Oded Gabbayc4d66342019-02-16 00:39:11 +0200304 hdev->asic_type = get_asic_type(pdev->device);
305 if (hdev->asic_type == ASIC_INVALID) {
306 dev_err(&pdev->dev, "Unsupported ASIC\n");
307 rc = -ENODEV;
308 goto free_hdev;
309 }
310 } else {
311 hdev->asic_type = asic_type;
312 }
313
Ofir Bittone5042a62021-04-01 13:43:40 +0300314 if (pdev)
Ohad Sharabi4cb45082021-05-20 09:09:03 +0300315 hdev->asic_prop.fw_security_enabled =
316 is_asic_secured(hdev->asic_type);
Ofir Bittone5042a62021-04-01 13:43:40 +0300317 else
Ohad Sharabi4cb45082021-05-20 09:09:03 +0300318 hdev->asic_prop.fw_security_enabled = false;
Ofir Bittone5042a62021-04-01 13:43:40 +0300319
Ofir Bitton66a76402020-10-05 14:40:10 +0300320 /* Assign status description string */
321 strncpy(hdev->status[HL_DEVICE_STATUS_MALFUNCTION],
322 "disabled", HL_STR_MAX);
323 strncpy(hdev->status[HL_DEVICE_STATUS_IN_RESET],
324 "in reset", HL_STR_MAX);
325 strncpy(hdev->status[HL_DEVICE_STATUS_NEEDS_RESET],
326 "needs reset", HL_STR_MAX);
327
Oded Gabbay8c173dc2019-05-08 09:55:23 +0300328 hdev->major = hl_major;
329 hdev->reset_on_lockup = reset_on_lockup;
farah kassabri03df1362020-05-06 11:17:38 +0300330 hdev->memory_scrub = memory_scrub;
Oded Gabbay27a9e352021-04-12 09:52:05 +0300331 hdev->boot_error_status_mask = boot_error_status_mask;
Ofir Bitton358526be2021-02-11 11:09:12 +0200332 hdev->stop_on_err = true;
Oded Gabbay27a9e352021-04-12 09:52:05 +0300333
Oded Gabbay8c173dc2019-05-08 09:55:23 +0300334 hdev->pldm = 0;
335
336 set_driver_behavior_per_device(hdev);
337
Koby Elbaz3e0ca9f2021-05-04 20:10:47 +0300338 hdev->curr_reset_cause = HL_RESET_CAUSE_UNKNOWN;
339
Oded Gabbay8c173dc2019-05-08 09:55:23 +0300340 if (timeout_locked)
341 hdev->timeout_jiffies = msecs_to_jiffies(timeout_locked * 1000);
342 else
343 hdev->timeout_jiffies = MAX_SCHEDULE_TIMEOUT;
344
345 hdev->disabled = true;
346 hdev->pdev = pdev; /* can be NULL in case of simulator device */
347
Oded Gabbayd9973872019-03-07 18:03:23 +0200348 /* Set default DMA mask to 32 bits */
349 hdev->dma_mask = 32;
350
Oded Gabbayc4d66342019-02-16 00:39:11 +0200351 mutex_lock(&hl_devs_idr_lock);
352
Oded Gabbay4d6a7752019-07-30 09:10:50 +0300353 /* Always save 2 numbers, 1 for main device and 1 for control.
354 * They must be consecutive
355 */
356 main_id = idr_alloc(&hl_devs_idr, hdev, 0, HL_MAX_MINORS,
Oded Gabbayc4d66342019-02-16 00:39:11 +0200357 GFP_KERNEL);
Oded Gabbayc4d66342019-02-16 00:39:11 +0200358
Oded Gabbay4d6a7752019-07-30 09:10:50 +0300359 if (main_id >= 0)
360 ctrl_id = idr_alloc(&hl_devs_idr, hdev, main_id + 1,
361 main_id + 2, GFP_KERNEL);
Oded Gabbayc4d66342019-02-16 00:39:11 +0200362
363 mutex_unlock(&hl_devs_idr_lock);
364
Oded Gabbay4d6a7752019-07-30 09:10:50 +0300365 if ((main_id < 0) || (ctrl_id < 0)) {
366 if ((main_id == -ENOSPC) || (ctrl_id == -ENOSPC))
Oded Gabbayc4d66342019-02-16 00:39:11 +0200367 pr_err("too many devices in the system\n");
Oded Gabbay4d6a7752019-07-30 09:10:50 +0300368
369 if (main_id >= 0) {
370 mutex_lock(&hl_devs_idr_lock);
371 idr_remove(&hl_devs_idr, main_id);
372 mutex_unlock(&hl_devs_idr_lock);
Oded Gabbayc4d66342019-02-16 00:39:11 +0200373 }
Oded Gabbay4d6a7752019-07-30 09:10:50 +0300374
375 rc = -EBUSY;
Oded Gabbayc4d66342019-02-16 00:39:11 +0200376 goto free_hdev;
377 }
378
Oded Gabbay4d6a7752019-07-30 09:10:50 +0300379 hdev->id = main_id;
380 hdev->id_control = ctrl_id;
Oded Gabbayc4d66342019-02-16 00:39:11 +0200381
382 *dev = hdev;
383
384 return 0;
385
386free_hdev:
387 kfree(hdev);
388 return rc;
389}
390
391/*
392 * destroy_hdev - destroy habanalabs device instance
393 *
394 * @dev: pointer to the habanalabs device structure
395 *
396 */
397void destroy_hdev(struct hl_device *hdev)
398{
399 /* Remove device from the device list */
400 mutex_lock(&hl_devs_idr_lock);
401 idr_remove(&hl_devs_idr, hdev->id);
Oded Gabbay4d6a7752019-07-30 09:10:50 +0300402 idr_remove(&hl_devs_idr, hdev->id_control);
Oded Gabbayc4d66342019-02-16 00:39:11 +0200403 mutex_unlock(&hl_devs_idr_lock);
404
405 kfree(hdev);
406}
407
408static int hl_pmops_suspend(struct device *dev)
409{
Chuhong Yuan30f27322019-07-23 20:46:08 +0800410 struct hl_device *hdev = dev_get_drvdata(dev);
Oded Gabbayc4d66342019-02-16 00:39:11 +0200411
412 pr_debug("Going to suspend PCI device\n");
413
414 if (!hdev) {
415 pr_err("device pointer is NULL in suspend\n");
416 return 0;
417 }
418
419 return hl_device_suspend(hdev);
420}
421
422static int hl_pmops_resume(struct device *dev)
423{
Chuhong Yuan30f27322019-07-23 20:46:08 +0800424 struct hl_device *hdev = dev_get_drvdata(dev);
Oded Gabbayc4d66342019-02-16 00:39:11 +0200425
426 pr_debug("Going to resume PCI device\n");
427
428 if (!hdev) {
429 pr_err("device pointer is NULL in resume\n");
430 return 0;
431 }
432
433 return hl_device_resume(hdev);
434}
435
436/*
437 * hl_pci_probe - probe PCI habanalabs devices
438 *
439 * @pdev: pointer to pci device
440 * @id: pointer to pci device id structure
441 *
442 * Standard PCI probe function for habanalabs device.
443 * Create a new habanalabs device and initialize it according to the
444 * device's type
445 */
446static int hl_pci_probe(struct pci_dev *pdev,
447 const struct pci_device_id *id)
448{
449 struct hl_device *hdev;
450 int rc;
451
452 dev_info(&pdev->dev, HL_NAME
453 " device found [%04x:%04x] (rev %x)\n",
454 (int)pdev->vendor, (int)pdev->device, (int)pdev->revision);
455
Oded Gabbay29593842019-04-04 14:33:34 +0300456 rc = create_hdev(&hdev, pdev, ASIC_INVALID, -1);
Oded Gabbayc4d66342019-02-16 00:39:11 +0200457 if (rc)
458 return rc;
459
460 pci_set_drvdata(pdev, hdev);
461
Ofir Bitton2e5eda42020-05-20 16:35:08 +0300462 pci_enable_pcie_error_reporting(pdev);
463
Oded Gabbayc4d66342019-02-16 00:39:11 +0200464 rc = hl_device_init(hdev, hl_class);
465 if (rc) {
466 dev_err(&pdev->dev, "Fatal error during habanalabs device init\n");
467 rc = -ENODEV;
468 goto disable_device;
469 }
470
471 return 0;
472
473disable_device:
Christophe JAILLET3002f462021-06-12 07:39:51 +0200474 pci_disable_pcie_error_reporting(pdev);
Oded Gabbayc4d66342019-02-16 00:39:11 +0200475 pci_set_drvdata(pdev, NULL);
476 destroy_hdev(hdev);
477
478 return rc;
479}
480
481/*
482 * hl_pci_remove - remove PCI habanalabs devices
483 *
484 * @pdev: pointer to pci device
485 *
486 * Standard PCI remove function for habanalabs device
487 */
488static void hl_pci_remove(struct pci_dev *pdev)
489{
490 struct hl_device *hdev;
491
492 hdev = pci_get_drvdata(pdev);
493 if (!hdev)
494 return;
495
496 hl_device_fini(hdev);
Ofir Bitton2e5eda42020-05-20 16:35:08 +0300497 pci_disable_pcie_error_reporting(pdev);
Oded Gabbayc4d66342019-02-16 00:39:11 +0200498 pci_set_drvdata(pdev, NULL);
Oded Gabbayc4d66342019-02-16 00:39:11 +0200499 destroy_hdev(hdev);
500}
501
Ofir Bitton2e5eda42020-05-20 16:35:08 +0300502/**
503 * hl_pci_err_detected - a PCI bus error detected on this device
504 *
505 * @pdev: pointer to pci device
506 * @state: PCI error type
507 *
508 * Called by the PCI subsystem whenever a non-correctable
509 * PCI bus error is detected
510 */
511static pci_ers_result_t
512hl_pci_err_detected(struct pci_dev *pdev, pci_channel_state_t state)
513{
514 struct hl_device *hdev = pci_get_drvdata(pdev);
515 enum pci_ers_result result;
516
517 switch (state) {
518 case pci_channel_io_normal:
519 return PCI_ERS_RESULT_CAN_RECOVER;
520
521 case pci_channel_io_frozen:
522 dev_warn(hdev->dev, "frozen state error detected\n");
523 result = PCI_ERS_RESULT_NEED_RESET;
524 break;
525
526 case pci_channel_io_perm_failure:
527 dev_warn(hdev->dev, "failure state error detected\n");
528 result = PCI_ERS_RESULT_DISCONNECT;
529 break;
530
531 default:
532 result = PCI_ERS_RESULT_NONE;
533 }
534
535 hdev->asic_funcs->halt_engines(hdev, true);
536
537 return result;
538}
539
540/**
541 * hl_pci_err_resume - resume after a PCI slot reset
542 *
543 * @pdev: pointer to pci device
544 *
545 */
546static void hl_pci_err_resume(struct pci_dev *pdev)
547{
548 struct hl_device *hdev = pci_get_drvdata(pdev);
549
550 dev_warn(hdev->dev, "Resuming device after PCI slot reset\n");
551 hl_device_resume(hdev);
552}
553
554/**
555 * hl_pci_err_slot_reset - a PCI slot reset has just happened
556 *
557 * @pdev: pointer to pci device
558 *
559 * Determine if the driver can recover from the PCI slot reset
560 */
561static pci_ers_result_t hl_pci_err_slot_reset(struct pci_dev *pdev)
562{
563 return PCI_ERS_RESULT_RECOVERED;
564}
565
Oded Gabbayc4d66342019-02-16 00:39:11 +0200566static const struct dev_pm_ops hl_pm_ops = {
567 .suspend = hl_pmops_suspend,
568 .resume = hl_pmops_resume,
569};
570
Ofir Bitton2e5eda42020-05-20 16:35:08 +0300571static const struct pci_error_handlers hl_pci_err_handler = {
572 .error_detected = hl_pci_err_detected,
573 .slot_reset = hl_pci_err_slot_reset,
574 .resume = hl_pci_err_resume,
575};
576
Oded Gabbayc4d66342019-02-16 00:39:11 +0200577static struct pci_driver hl_pci_driver = {
578 .name = HL_NAME,
579 .id_table = ids,
580 .probe = hl_pci_probe,
581 .remove = hl_pci_remove,
Oded Gabbayfcaebc72020-12-14 12:52:06 +0200582 .shutdown = hl_pci_remove,
Oded Gabbay135ade02021-05-26 11:14:21 +0300583 .driver = {
584 .name = HL_NAME,
585 .pm = &hl_pm_ops,
586 .probe_type = PROBE_PREFER_ASYNCHRONOUS,
587 },
Ofir Bitton2e5eda42020-05-20 16:35:08 +0300588 .err_handler = &hl_pci_err_handler,
Oded Gabbayc4d66342019-02-16 00:39:11 +0200589};
590
591/*
592 * hl_init - Initialize the habanalabs kernel driver
593 */
594static int __init hl_init(void)
595{
596 int rc;
597 dev_t dev;
598
599 pr_info("loading driver\n");
600
601 rc = alloc_chrdev_region(&dev, 0, HL_MAX_MINORS, HL_NAME);
602 if (rc < 0) {
603 pr_err("unable to get major\n");
604 return rc;
605 }
606
607 hl_major = MAJOR(dev);
608
609 hl_class = class_create(THIS_MODULE, HL_NAME);
610 if (IS_ERR(hl_class)) {
611 pr_err("failed to allocate class\n");
612 rc = PTR_ERR(hl_class);
613 goto remove_major;
614 }
615
Oded Gabbayc2164772019-02-16 00:39:24 +0200616 hl_debugfs_init();
617
Oded Gabbayc4d66342019-02-16 00:39:11 +0200618 rc = pci_register_driver(&hl_pci_driver);
619 if (rc) {
620 pr_err("failed to register pci device\n");
Oded Gabbayc2164772019-02-16 00:39:24 +0200621 goto remove_debugfs;
Oded Gabbayc4d66342019-02-16 00:39:11 +0200622 }
623
624 pr_debug("driver loaded\n");
625
626 return 0;
627
Oded Gabbayc2164772019-02-16 00:39:24 +0200628remove_debugfs:
629 hl_debugfs_fini();
Oded Gabbayc4d66342019-02-16 00:39:11 +0200630 class_destroy(hl_class);
631remove_major:
632 unregister_chrdev_region(MKDEV(hl_major, 0), HL_MAX_MINORS);
633 return rc;
634}
635
636/*
637 * hl_exit - Release all resources of the habanalabs kernel driver
638 */
639static void __exit hl_exit(void)
640{
641 pci_unregister_driver(&hl_pci_driver);
642
Oded Gabbayc2164772019-02-16 00:39:24 +0200643 /*
644 * Removing debugfs must be after all devices or simulator devices
645 * have been removed because otherwise we get a bug in the
646 * debugfs module for referencing NULL objects
647 */
648 hl_debugfs_fini();
649
Oded Gabbayc4d66342019-02-16 00:39:11 +0200650 class_destroy(hl_class);
651 unregister_chrdev_region(MKDEV(hl_major, 0), HL_MAX_MINORS);
652
653 idr_destroy(&hl_devs_idr);
654
655 pr_debug("driver removed\n");
656}
657
658module_init(hl_init);
659module_exit(hl_exit);